Prior works, such as the Tallinn manual on the international law applicable to cyber warfare, focus on the circumstances of cyber warfare. Many organizations are considering how to conduct cyber warfare, but few have discussed methods to reduce, or even prevent, cyber conflict. A recent series of publications started developing the framework of Cyber Peacekeeping (CPK) and its legal requirements. These works assessed the current state of organizations such as ITU IMPACT, NATO CCDCOE and Shanghai Cooperation Organization, and found that they did not satisfy requirements to effectively host CPK activities. An assessment of organizations currently working in the areas related to CPK found that the United Nations (UN) has mandates and organizational structures that appear to somewhat overlap the needs of CPK. However, the UN's current approach to Peacekeeping cannot be directly mapped to cyberspace. In this research we analyze the development of traditional Peacekeeping in the United Nations, and current initiatives in cyberspace. Specifically, we will compare the proposed CPK framework with the recent initiative of the United Nations named the 'Digital Blue Helmets' as well as with other projects in the UN which helps to predict and mitigate conflicts. Our goal is to find practical recommendations for the implementation of the CPK framework in the United Nations, and to examine how responsibilities defined in the CPK framework overlap with those of the 'Digital Blue Helmets' and the Global Pulse program.
[1]
George Loukas,et al.
Cyber-Physical Attacks: A Growing Invisible Threat
,
2015
.
[2]
Thomas Elkjer Nissen.
Cyber warfare by social network media
,
2016
.
[3]
Sean Watts.
Tallinn manual on the international law applicable to cyber warfare
,
2013
.
[4]
John Karlsrud,et al.
Peacekeeping 4.0: Harnessing the Potential of Big Data, Social Media, and Cyber Technologies
,
2014
.
[5]
Michael N. Schmitt,et al.
Tallinn Manual on the International Law Applicable to Cyber Warfare: The law of cyber armed conflict
,
2013
.
[6]
Lilly Pijnenburg Muller,et al.
How to govern cyber security? The limits of the multi- stakeholder approach and the need to rethink public–private cooperation
,
2016
.
[7]
Joshua I. James,et al.
Legislative Requirements for Cyber Peacekeeping
,
2017,
J. Digit. Forensics Secur. Law.
[8]
Melanie Ramjoué,et al.
Improving UN Intelligence through Civil–Military Collaboration: Lessons from the Joint Mission Analysis Centres
,
2011
.
[9]
John Karlsrud.
New tools for blue helmets
,
2016
.
[10]
Deborah L. Gladstein,et al.
Group Decision Making Under Threat: The Tycoon Game
,
1985
.